{"id":"CVE-2024-24583","details":"Multiple out-of-bounds read vulnerabilities exist in the readMSH functionality of libigl v2.5.0. A specially crafted .msh file can lead to an out-of-bounds read. An attacker can provide a malicious file to trigger this vulnerability.This vulnerabilitty concerns the`readMSH` function while processing `MshLoader::ELEMENT_TRI` elements.","modified":"2025-11-20T12:25:32.403953Z","published":"2024-05-28T14:15:11.380Z","references":[{"type":"ADVISORY","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2024-1928"},{"type":"ADVISORY","url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1928"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libigl/libigl","events":[{"introduced":"0"},{"last_affected":"fdaac01bcc52888994f7afd029dcc045dd408484"}]}],"versions":["v1.3.1","v1.3.2","v1.3.3","v2.0.0","v2.1.0","v2.2.0","v2.3.0","v2.4.0","v2.5.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-24583.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}]}